english

Rowhammer attacks are really interesting. They uses some of the physical properties of how computer memory is designed to overcome the logical control of how it is used. The bits of information are stored so close together in modern memory that if you ‘wiggle’ one bit fast enough, sometimes the ones next to it flip …

Presented by Dr. Israat Haque at the 2018 Atlantic Security Conference Software Defined Network (SDN) is a new approach of designing networks. In SDN architecture network control function is decoupled from hardware like routers and switches. This decoupled control function is executed in a logically centralized controller with a global network view. Furthermore, SDN brings …

Luigi Logrippo at the Université du Québec en Outaouais presents the importance of multi-level access control methods for access control, data secrecy and data privacy. They suggest that an access control system that intends to provide secrecy and privacy must implement a multi-level access control method. In a system with data that is secret and …

Presented at the SERENE-RISC Workshop, 2017 October by Nabil Seddigh, President, Solana Networks Machine Learning an Artificial Intelligence is often presented as the cure all for cybersecurity issues. Nabil Seddigh provides some perspective on the development of this new technology and the place it will likely occupy in the security landscape. Run Time < …

A question answered with a question is often infuriating. On some rare occasions though it can be inspiring. When Tom Levasseur asked a local college why they don’t take advantage of gamification by integrating some of the challenge and fun of hacking competitions into their program they responded with “Why don’t you …?” The government …

Crime statistics are a curious thing. Data available from police and the courts provide well-defined set of numbers but are limited by the amount of crime reported to and processed by the police and other over-burdened institutions. If we are to understand where we are lacking, we need to assess the gap between the actual …

Presented at the SERENE-RISC Workshop 2017, April. In this talk Dr. Gabriella Coleman will provide a history of Anonymous’ crucial role in establishing a novel style of hacking-for-leaking: public disclosure hacks. In contrast to traditional whistle-blowing—instigated by insiders who possess intimate awareness of wrongdoing and access to documents that can prove it—a public disclosure hack …

Its hard to keep growing professionally, particularly in a field as challenging as cybersecurity. It’s a dynamic and complex field with an ever-shifting landscape. Moreover, it’s a field that ironically requires both shared experience and non-disclosure agreements. Security conferences fill this space, providing the chance to learn from leaders and network with peers. A commitment to …

Presented at the SERENE-RISC Workshop 2017, April. Bitcoin (BTC) has often been referred to as “nerd money”. However, since the first BTC transaction in 2009, the decentralized cryptocurrency has become more popular and is becoming widely available with more users and merchants adopting the cryptocurrency every day. This presentation will provide a high-level taxonomy of …